Cybersecurity: Eyes Wide Open

Steve Ursillo, Jr. | April 10, 2018 |

Cyber theft is evolving and assailants are continuously looking for new and creative ways to monetize data, says Steve Ursillo, Jr., Partner, Risk Assurance & Advisory and National Leader: Information Assurance & Cybersecurity at Cherry Bekaert. Attackers may target many smart technologies, including smart home technology and the Internet of Things. Steve highlights multiple forms of cybercrime, including ransomware, that companies need to prepare for and encourages all organizations to evolve their incident response programs with an “assumed breach” mentality to protect businesses of all sizes.

Steve Ursillo, Jr.

Partner, Risk Assurance & Advisory and National Leader: Information Assurance & Cybersecurity, Cherry Bekaert LLP

is a Partner in Cherry Bekaert's Risk Assurance & Advisory Services (RAAS) group and serves as the National Leader for the Information Assurance & Cybersecurity practice. He specializes in technology risk management, internal control over financial reporting, information system security, privacy, cyber fraud, cybersecurity governance, IT assurance and IT advisory services. With more than 20 years of experience, Steve provides a variety of IT audit and security services for his clients across multiple industries. Steve holds several professional designations that are relevant to his experience and the firms’ practice consisting of the following: CPA, CIA, CGMA, CFE, CISA, CISM, CITP, CISSP, CGEIT, CRISC, CEH and CCSFP.  See more by Steve Ursillo, Jr.

Join the Conversation

To leave a comment below, login or register with IFAC.org

Thank you for your interest in our publications. These valuable works are the product of substantial time, effort and resources, which you acknowledge by accepting the following terms of use. You may not reproduce, store, transmit in any form or by any means, with the exception of non-commercial use (e.g., professional and personal reference and research work), translate, modify or create derivative works or adaptations based on such publications, or any part thereof, without the prior written permission of IFAC.

Our reproduction and translation policies, as well as our online permission request and inquiry system, are accessible on the Permissions Information web page.

For additional information, please read our website Terms of Use. ALL RIGHTS RESERVED.